NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
What Works Clearinghouse Rating
Showing 1 to 15 of 151 results Save | Export
Frank Xavier Gearhart – ProQuest LLC, 2024
Digital systems are pervasive in modern societies -- augmenting personal and commercial driving, detecting cancer, and exploiting transitory events in financial markets. Attacks on these systems are growing in number, sophistication, and impact. Current cyber defenses are proving inadequate against some of these attacks. Cyber defense tools that…
Descriptors: Artificial Intelligence, Information Security, Man Machine Systems, Natural Language Processing
Peer reviewed Peer reviewed
Direct linkDirect link
Jordi Guitart; Juan José Costa – Interactive Learning Environments, 2024
The pandemic situation banned the presence of teachers and students in the classrooms disrupting the typical teaching process. Videoconferencing services have been used successfully for lectures, but they are insufficient for hands-on laboratories where the physical presence is a requirement (i.e. to access specific hardware). Enabling remote…
Descriptors: Distance Education, Laboratories, Computer Networks, Videoconferencing
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frydenberg, Mark – Information Systems Education Journal, 2023
The Internet of Things (IoT) is a network of objects that can exchange data with other devices also connected to the Internet. One of the most common consumer examples of IoT is home automation, as a variety of smart devices, including doorbells, lightbulbs, thermostats, and refrigerators are now available which users can control remotely using…
Descriptors: Internet, Computer Software, Automation, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Abhishek Vaish; Ravindra Kumar; Samo Bobek; Simona Sternad – Journal of Cybersecurity Education, Research and Practice, 2024
The cyber security education market has grownup exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Forum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour.…
Descriptors: Experiential Learning, Computer Networks, Information Security, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Draus, Peter; Mishra, Sushma; Slonka, Kevin; Bromall, Natalya – Information Systems Education Journal, 2022
Information Technology (IT) skills gap discourse suggests a mismatch between what students are acquiring in terms of knowledge and skills in their education versus what employers believe are useful skills for doing day to day tasks. This study builds upon previous research (analyzing the skills of college students in IT-related majors) by…
Descriptors: Skills, Achievement Gap, Employment Qualifications, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Parlakkiliç, Alaattin – International Journal of Modern Education Studies, 2019
Today, digital transformation is changing the educational and social life rapidly. In contrast, organizations and educational institutions, developers, and end users do not benefit from cloud-based mobile technologies to the desired level. Mobile systems are used extensively for educational purposes in the Internet of Things (IoT) environment, and…
Descriptors: Computer Software, Computer Science Education, Internet, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Tshiani, Valerie Mujinga; Tanner, Maureen – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2018
Contribution: This study contributes to scientific literature by detailing the impact of specific factors on the privacy concerns of citizens living in an African city. Findings: The findings reveal that the more that impersonal data is collected by the Smart City of Cape Town, the lower the privacy concerns of the digital natives. The findings…
Descriptors: Privacy, Foreign Countries, Information Technology, Developing Nations
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Zabasta, Anatolijs; Peuteman, Joan; Kunicina, Nadezda; Kazymyr, Volodymyr; Hvesenya, Sergey; Hnatov, Andrii; Paliyeva, Tatsiana; Ribickis, Leonids – Education Sciences, 2020
The increasing importance of continuingly complex Cyber-Physical Systems (CPS) challenges and encourages universities worldwide to organize up-to-date CPS oriented educational programs. The Erasmus+ project "CybPhys" aims to support CPS oriented educational programs in Belarus and Ukraine. We put forward a hypothesis that the educational…
Descriptors: Foreign Countries, Geographic Regions, Cultural Differences, Higher Education
Chen, Haoming – ProQuest LLC, 2016
Video compression and communication has been an important field over the past decades and critical for many applications, e.g., video on demand, video-conferencing, and remote education. In many applications, providing low-delay and error-resilient video transmission and increasing the coding efficiency are two major challenges. Low-delay and…
Descriptors: Video Technology, Telecommunications, Information Technology, Coding
Peer reviewed Peer reviewed
Direct linkDirect link
Kok, Illasha; Beter, Petra; Esterhuizen, Hennie – International Journal of Distance Education Technologies, 2018
Fragmented connectivity in South Africa is the dominant barrier for digitising initiatives. New insights surfaced when a university-based nursing programme introduced tablets within a supportive network learning environment. A qualitative, explorative design investigated adult nurses' experiences of the realities when moving from paper-based…
Descriptors: Nurses, Handheld Devices, Information Technology, Blended Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frolova, Elena V.; Ryabova, Tatyana M.; Rogach, Olga V. – European Journal of Contemporary Education, 2019
The dynamic development of information and communication technologies, the strengthening of the public demand for digitalization of various spheres of life, orient the Moscow education system towards the active introduction of digital technologies and high-tech educational environment development. The purpose of this article is to analyze the…
Descriptors: Information Technology, Technology Integration, Program Implementation, Barriers
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Osaheni Oni; Kelly Odaro-Ekhaguebo; Emmanuel Akpoduado – Journal of Pedagogical Research, 2018
This study assessed Information and Communication Technology (ICT) Proficiency of Secondary School Teachers in Auchi Polytechnic Staff School. The study employed a descriptive surveyed design and purposive sampling techniques to select fifty-three (53) respondents for the study. A structured questionnaire was used to collect data. The data…
Descriptors: Technological Literacy, Pedagogical Content Knowledge, Information Technology, Teacher Evaluation
Grochow, Jerrold M. – EDUCAUSE, 2014
Just as maintaining a healthy infrastructure of water delivery and roads is essential to the functioning of cities and towns, maintaining a healthy infrastructure of information technology is essential to the functioning of universities. Deterioration in IT infrastructure can lead to deterioration in research, teaching, and administration. Given…
Descriptors: Information Technology, Guidelines, Universities, Information Systems
Mohammadi, Hadi – ProQuest LLC, 2014
Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to…
Descriptors: Computer Networks, Computer Software, Computer Security, Prevention
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11